Terms of Service
1. Service Agreement
By accessing Rocket Proxy services, you agree to abide by our operational standards. While we strive for 99.9% network availability, occasional maintenance is required to maintain 10Gbps speeds. We commit to restoring service with maximum priority during any unforeseen outages.
2. Acceptable Use Policy
Our infrastructure is optimized for high-bitrate streaming and data privacy. To ensure network integrity, the following actions are strictly prohibited:
- Automated botting, hacking, or participation in DDoS activities.
- Engaging in activities that violate local or international jurisdictions.
- Unauthorized account sharing. Each proxy is provisioned for a specific number of IP rotations based on your plan; exceeding these limits may result in automated suspension.
3. Refund & Satisfaction Guarantee
We stand by our network quality with a 24-Hour Performance Guarantee. If you encounter technical issues that our support team cannot resolve within the first 24 hours of service, a full refund will be issued. Beyond this window, resources are committed to our data center providers and are non-refundable.
Privacy Policy
1. Zero-Knowledge Commitment
We operate under a strict Zero-Logs Policy for OTT data. We do not track or record the Live TV, movies, or series you stream through our endpoints. Your traffic remains encrypted and private.
2. Data Collection & Usage
To provide and secure our service, we collect minimal information:
- Contact Information: We store your email address solely for credential delivery and critical service updates.
- Financial Privacy: Payments are processed via secure, encrypted third-party gateways. Rocket Proxy does not store or see your full credit card details.
- Network Load Balancing: We monitor aggregate data volume to prevent network abuse, but we never inspect the packets themselves.
- Temporary IP Logging: Connection IPs are logged for a rolling 24-hour period. This is a security measure to prevent proxy leaks and unauthorized account redistribution. Logs are automatically purged daily.
3. Infrastructure Security
Our server environment is hardened to enterprise standards. We utilize Fail2Ban, UFW, and System-Level blocking. Root access is disabled, and our nodes are monitored for integrity. In the highly unlikely event of a breach, our servers contain no long-term user logs, as data is rotated or deleted every 24 hours.